A radio terminal is organized to send a first access signal then, when it receives a positive acknowledgement from a base station, a second access signal, resources of the communication network being allocated to the radio terminal after receipt of the said second access signal at the base station. At a base station, the first access signal sent by a radio terminal is received and the communication service requested by the terminal is detected therein. In conditional manner, depending on the detected communication service, a receive power of the first access signal is measured, the measured receive power is compared with a threshold, and the transmission of a positive acknowledgement of the first access signal to the radio terminal is inhibited, when the measured receive power is greater than the said threshold.
|
17. A method of controlling access of at least one radio terminal to resources of a radio communication network including at least one base station, the method comprising:
receiving, at the base station, a first access signal sent by the radio terminal;
determining, from the first access signal, a type of communication service requested by the radio terminal;
when the type of communication service is determined to be a first type:
measuring a receive power of the first access signal;
comparing the measured receive power with a threshold; and
inhibiting a transmission of a positive acknowledgement of the first access signal to the radio terminal when the measured receive power is greater than the said threshold; and
transmitting a positive acknowledgement of the first of the first access signal to the radio terminal if the type of communication service is determined to be a second type.
1. Method of controlling access of at least one radio terminal to resources of a radio communication network to implement a communication service, the radio communication network comprising at least one base station, the radio terminal being organized to send a first access signal then, when it receives a positive acknowledgement of the first access signal from a base station, a second access signal substantially longer than the said first access signal, resources of the communication network being allocated to the radio terminal after receipt of the said second access signal at the base station, the method comprising:
receiving at a base station the first access signal sent by a radio terminal;
detecting, from the first access signal, a type of the communication service requested by the radio terminal; and
at least one of the following operations, in conditional manner, according to the detected type of the communication service:
measuring a receive power of the first access signal;
comparing the measured receive power with a threshold; and
inhibiting the transmission of a positive acknowledgement of the first access signal to the radio terminal, when the measured receive power is greater than the said threshold; wherein the first access signal is sent by the radio terminal along a partition of a partitioned random access channel, the said partition depending on the requested type of the communication service, in which each partition of the random access channel is characterized by a set of respective access parameters, such as a transmit sub-channel of the random access channel and a signature contained in the first access channel.
9. base station of a radio communication network, comprising:
means for receiving and positively acknowledging a first access signal from a radio terminal requesting a communication service;
means for receiving a second access signal substantially longer than the said first access signal, resources of the communication network being allocated to the radio terminal after receipt of the said second access signal at the base station;
means for detecting, based on a first access signal received from a radio terminal, a type of the communication service requested by the radio terminal;
means for measuring a receive power of the first access signal;
means for comparing the measured receive power with a threshold; and
means for inhibiting the transmission of a positive acknowledgement of the first access signal to the radio terminal, when the measured receive power is greater than the said threshold,
wherein at least one of the means for measuring, the means for comparing and the means for inhibiting being implemented, in a conditional manner, according to the type of the communication service detected by the means for detecting; wherein the first access signal is sent by the radio terminal along a partition of a partitioned random access channel, the said partition depending on the requested type of the communication service, in which each partition of the random access channel is characterized by a set of respective access parameters, such a transmission sub-channel of the random access channel and a signature contained in the first access signal, and in which the means for receiving the first access signal comprise means for detecting the said partition of the partitioned random access channel along which the first access signal is sent.
2. Method according to
3. Method according to
4. Method according to
5. Method according to
6. Method according to
7. Method according to
8. Method according to
10. base station according to
11. base station according to
12. base station according to
13. base station according to
14. base station according to
15. base station according to
16. base station according to
18. The method of
19. The method of
20. The method of
|
The present invention relates to radiocommunications with mobiles, and more particularly the methods of controlling access by mobile terminals to resources of a radiocommunication network.
Many radiocommunication systems use methods of controlling transmit power in order to reduce the level of interference between the various communications. This power control has a particular importance in spread spectrum systems using Code Division Multiple Access (CDMA). In these systems, several terminals can share the same frequency at every moment, the separation of the channels on the radio interface resulting from the quasi-orthogonality of the spread codes respectively applied to the signals sent over those channels. In other terms, for a given channel, the contributions of the other channels are seen as noise.
In particular, on the uplink, transmit power control limits the transmit power of the mobiles close to a base station to prevent the signals that they send masking the signals originating from more distant mobiles. In general, the power control methods use loop power control: the base station takes measurements on the signal received from a mobile (power, signal-to-interferer ratio (C/I), etc.), and transmits commands to increase or reduce power on the downlink in order to tend towards a given quality objective. These methods cannot be used before a radio link is established between the base station and the mobile. In particular, they do not allow idle mobiles to determine the level of power at which they must send any random access requests.
For UMTS (“Universal Mobile Telecommunications System”) systems, the transmit loop power controls on the uplink are described in technical specification 3G TS 25.401, version 3.3.0, published in June 2000 by the 3GPP (“3rd Generation Partnership Project”), pages 20-21.
For the power of the first signals sent by a mobile terminal to a base station, particularly for a new communication, these loop power controls are not operational, because the base station has not received the previous signal from the mobile terminal allowing it to take the required measurements. The mobile terminal then estimates the power of these first signals according to another procedure based on the attenuation of the signals sent by the base station and received by the mobile terminal. The base station broadcasts a beacon signal indicating the power at which it has sent it. The receipt of these beacon signals allows the idle mobile to determine the resources used by the base station with which the link is the best (cell selection) and to evaluate the attenuation of the signal from that station. From this it deduces an initial power for transmission of the radio signals to the selected base station, the power equalling the degree of attenuation.
In certain circumstances, particularly when the mobile terminal is very close to the receive antenna of the base station, the result of this estimate may be a very low transmit power. Such is the case for example of a call from a maintenance agent working on the base station itself and using his radio terminal.
Now a radio terminal, due to its construction, has a minimal radio transmit power below which it is not capable of transmitting. Technical specification 3G TS 25.101, version 3.6.0, published in March 2001 by the 3GPP, recommends a minimal transmit power by UMTS mobile terminals of −50 dBm (section 6.4.3, page 13).
If the transmit power estimated for the random access request is below this minimal power, the mobile terminal sends the random access request with its minimal transmit power (see technical specification 3G TS 25.214, version 5.4.0, published by the 3GPP in March 2003, section 6.1).
If this transmit power is clearly greater than the power estimated from the attenuation measurements, this transmission risks generating significant noise for the other radio signals received by the base station and therefore damaging the quality of transmission of the communications in progress to which these other signals belong.
To limit this effect, WO 99/65158 proposes that, when a mobile terminal is too close to a base station, this base station transmits a “first command” to the said mobile terminal, making it enter a degraded operation mode, in order to prevent that terminal harming the communications of other mobile terminals. This “first command” may in particular be generated after an access request and be transmitted instead of the channel allocation. The effect of this command may be to inhibit or delay the establishment of a link between the mobile terminal and the base station in question.
This solution inhibits the procedure of establishing a communication. This inhibition is performed systematically when the mobile terminal is considered too close to the base station, without consideration of the type of service envisaged.
In particular, if the mobile terminal requests a specific communication service while being close to a base station, for example if it attempts to make an emergency call, this call risks being impossible due to it being inhibited during the establishment procedure. Now, for obvious reasons, it is desirable that certain communications such as emergency calls can be made in all circumstances.
WO 02/098017 proposes to inhibit the transmission of network access signals by a mobile terminal when the difference between its minimal transmit power and the estimated initial transmit power exceeds a predefined threshold, that is to say when the mobile terminal is too close to a base station of the access network. This manner of proceeding can be used to deal easily with the problem of emergency calls since the terminal can itself override the inhibition of the access signals when it knows that it is in the process of requesting an emergency call. But since this solution is not standardized, it will in practice be applied only by a small proportion of the population of terminals in circulation. Now the inhibition of network access requests from a terminal too close to a base station essentially benefits the other terminals situated in the cell, which suffer less interference. This observation is of the type that restrains recourse to this type of precaution, despite its value for the network user community.
An object of the present invention is to restrict these disadvantages in particular by avoiding systematically inhibiting all call attempts without distinction for a mobile terminal too close to a base station of an access network, and to do this without counting on the mobile terminal itself.
Thus the invention proposes a method of controlling access of at least one radio terminal to resources of a radiocommunication network to implement a communication service, the radiocommunication network comprising at least one base station. The radio terminal is organized to send a first access signal then, when it receives a positive acknowledgement of the first access signal from a base station, a second access signal substantially longer than the said first access signal, resources of the communication network being allocated to the radio terminal after receipt of the said second access signal at the base station. The method comprises the following steps:
Such a method thus makes it possible to restrict the access attempts of terminals too close to a base station to a single transmission of a signal of short duration, for example the preamble of an access signal. only the terminals sufficiently distant from the base station, and therefore not likely to generate interference harmful to other communications, may continue their access attempt by transmitting the second and main access signal to the network. Specifically, the receive power of the first access signal gives a pertinent indication of the distance between the radio terminal and the base station in question.
In addition, the processing of the access signals differs depending on the communication service requested, so that the indication relating to the distance separating the radio terminal and the base station is not taken into account for certain types of calls. In particular, emergency calls may not be subject to a discrimination measure as a function of the distance.
The distinction between the communication services may be made by using partitions of a random access channel, which may take the form for example of a subchannel, that is to say a time-related selection of the random access channel and/or a signature contained in the first access signal. The correspondence between partitions of the random access channel and communication services may advantageously be deduced from information broadcast by the base station.
The invention also proposes a base station of a radiocommunication network, comprising means for receiving and positively acknowledging a first access signal from a radio terminal requesting a communication service, and means for receiving a second access signal substantially longer than the said first access signal, resources of the communication network being allocated to the radio terminal after receipt of the said second access signal at the base station. The base station also comprises:
At least some of the means /b/, /c/, /d/ are implemented, in conditional manner, according to the communication service detected by the means /a/.
The invention is described here in its application to the radio access network of a cellular system of the UMTS type. This access network, called UTRAN (“UMTS Terrestrial Radio Access Network”) uses the CDMA technique. It comprises radio network controllers 5 called RNC which, via an interface Iub, drive network nodes called “node B”. Each node B comprises one or more base stations 1 each serving one or more cells. These base stations communicate by radio with mobile terminals 2, 3 called UE (“User Equipment”) via an interface Uu (see technical specification 3G TS 25.401, version 3.3.0).
The mobile terminals may be relatively far from the base station or extremely close such as the mobile terminal 3 shown in
Each UE 2, 3 may be in several states of connection with the UTRAN, managed by a radio resource control protocol (RRC) implemented at the RNC and at the UE (see technical specification 3G TS 25.331, version 3.9.0, published in December 2001 by the 3GPP, section 9). In some of these states, the UE is actively connected to the radiocommunication system, that is to say in particular that it can send to the base station radio signals relating to a communication in progress. In these states, the loop power controls of the transmit power by the UE are operational.
When the UE is powered up and in a selected cell without having any communication in progress with the UTRAN, it is in an idle state. The processes of initial selection and reselection of the cell are described in technical specification 3G TS 25.304, version 3.6.0 published in March 2001 by the 3GPP, section 5.2. In this idle state, after having selected a cell, the UE receives system information sent over a broadcast channel (BCH) by the base station of the selected cell (see technical specification 3G TS 25.331, version 3.9.0, section 8.1.1).
This system information includes, amongst other things:
The summed signal delivered by the adder 14 is multiplied by the scrambling code Cscr of the cell, applied to the multiplier 15. The output from this multiplier 15 is connected to the radio stage 16 of the station which generates the radio signal transmitted by the antenna 17.
To initialize a communication, or more generally to transmit information to the UTRAN in idle mode, the UE transmits to the selected base station a random access request signal on a common channel called the PRACH (“Physical Random Access Channel”).
This random access procedure is executed by the physical layer (see technical specification 3G TS 25.214, version 5.4.0, section 6), under the control of the medium access control layer MAC (see technical specification 3G TS 25.321, version 3.4.0, published in June 2000 by the 3GPP, section 11.2.2) and of the RRC layer. The instances of the MAC and RRC protocols executed in the UE are respectively illustrated by the modules 19 and 20 in
The module 20 processes the system information decoded on the CCPCH by the receive portion 21 of the UE based on the radio signal captured by the antenna 22 and processed by the radio stage 23. The receiver 21 also measures the receive power on the CPICH (parameter CPICH_RSCP according to technical specification 3G TS 25.215, version 3.3.0, published in June 2000 by the 3GPP, section 5.1.1), expressed in dBm.
Prior to the transmission of the random access request, the RRC module 20 of the UE estimates a transmit power PI of this request (“Preamble_Initial_Power”), on the basis of the last measurement of the receive power CPICH_RSCP and of the transmit power of the base station on the CPICH as indicated in the broadcast system information. This estimate is made as indicated in technical specification 3G TS 25.331, version 3.9.0, section 8.5.7:
The recommended accuracy for this determination is ±9 dB to ±12 dB (technical specification 3G TS 25.101, version 3.6.0, page 12). For a UE 3 very close to the base station 1, this calculated transmit power value PI may be for example of the order of −70 dBm.
Because of the characteristics of the radio portion 23 of the UE, the latter can transmit properly formatted radio signals only beyond a determined minimal power Pmin (for example −50 dBm).
When PI<Pmin, the transmission portion 24 of the UE transmits the random access request on the PRACH channel with the power Pmin.
The random access procedure is described in greater. detail below.
Furthermore, RACH subchannels are defined amongst the 15 access slots of the PRACH channel, on a basis of 12 access slots. The subchannel RACH i, where i is an integer between 0 and 11, consists in the corresponding uplink access slot of index i, and every 12th access slot following this slot, that is to say the access slots of index i+12. k modulo 15, where k is an integer (see technical specification 3G TS 25.214, version 5.4.0, published by the 3GPP in March 2003, section 6.1).
A random access request is made consisting of two distinct signals which may be seen as two portions of one and the same access signal: a preamble and an access message (main portion of the signal), the latter being substantially larger than the preamble and therefore a longer transmission duration than that of the preamble (10 ms or 20 ms). The preamble comprises 256 repetitions of a code called the signature and denoted Ps(n), where n is an integer between 0 and 15. The signatures Ps(n) are Hadamard codes of 16 chips in length. The formulation of these codes may be found in section 4.3.3 of technical specification TS 25.213, version 3.7.0, published in December 2001 by the 3GPP.
A random access request is therefore made by transmitting a signal corresponding to the preamble on one subchannel i of the PRACH channel (out of the 12 possible subchannels), denoted sc(i), and by using a signature Ps(n) (out of the 16 possible signature codes). These access parameters may be the subject of one pair of parameters characteristic of random access, out of all the possible pairs: (sc(i); Ps(n)), where 0≦i≦11 and 0≦n≦15, where i designates an RACH subchannel number and n a preamble signature index. Such a pair may be considered as one partition out of all the partitions constituting the PRACH channel.
Furthermore, access service classes or ASC are defined in the UMTS system. Each ASC class corresponds to a set of partitions of the PRACH channel, that is to say of pairs (sc(i); Ps(n)) as defined above, where i is between a minimal value and a maximal value, within the limits indicated above. A cross-check is possible between the partitions of the PRACH and ASC classes such that one and the same pair (sc(i); Ps(n)) may correspond to several distinct ASC classes. It is assumed hereafter that there is at least one set of at least one pair (sc(i); Ps(n)) where imin,θ≦i≦imax,θ and nmin,θ≦n≦nmax,θ, such that this set corresponds only with a single access service class, denoted ASC(θ).
Any random access procedure on the physical layer is initiated at the request of the MAC layer. It can be made only if the physical layer has received from the RRM layer a set of available signatures and the RACH subchannels available for each ASC class.
In addition, the UMTS system comprises access classes which can be used to distinguish types of calls. These access classes are described in detail in 3GPP specification TS 22.011, version V3.7.0, paragraph 4 (p. 11 and 12). Sixteen access classes, numbered from 0 to 15, are defined in the UMTS standard.
The standard access classes (AC), numbered from 0 to 9, correspond to the standard calls and are allocated to all the subscribers in order to obtain a uniform random distribution. Each subscriber is therefore assigned a standard access class, which is stored in his subscriber identity module, called the SIM/USIM module (“Universal Subscriber Identity Module”), which may where necessary be a card that is inserted in the terminal.
In addition to this standard access class, certain subscribers have one or more access classes from the five access classes numbered from 11 to 15. Access class number 10 is, for its part, reserved for emergency calls.
Furthermore, there is a correspondence, specific to each cell, between the ASC classes and the AC access classes (see paragraph 8.5.13 of 3GPP specification TS 25.331, version V3.9.0 published in December 2001 by the 3GPP). In the UMTS system, a single ASC class may be placed in correspondence with the standard access classes, while the other AC access classes may be placed individually in correspondence with an ASC class.
In the rest of the description, it will be assumed that the class ASC(θ) is placed only in correspondence with a given access class. In an advantageous embodiment, this AC access class will be access class 10, reserved for emergency calls.
As mentioned above, when the UE is in the idle mode, after having selected a cell, it receives system information transmitted on the BCH transmission channel by the base station covering the selected cell. This system information comprises, in addition to the abovementioned parameters, uplink access control information and information relating to the random access procedure on the physical layer.
The uplink access control information comprises the AC access classes for which random access is authorized. The information relating to the random access procedure on the physical layer identifies the access slots and the signatures that it is allowed to use. This system information also includes the correspondence between the AC access classes and ASC classes for the cell.
Furthermore, the random access procedure on the physical layer allows for the transmission by the UTRAN of an indicator of acknowledgement (“AI—Acquisition Indicator”) of the RACH preamble signature, sent by a mobile terminal. This acknowledgement is transmitted over the downlink common physical channel AICH (“Acquisition Indicator Channel”). It has a structure similar to that of the RACH preamble, since it uses a spread factor equal to 256 and a 16 chip sequence signature. The acknowledgement of the random access may be positive or negative. In one embodiment, an acknowledgement on the AICH channel using a signature identical to the RACH preamble signature is positive, whereas an acknowledgement using a signature inverted relative to the RACH preamble signature is negative.
The AICH channel is, like the RACH subchannels, structured according to a pattern comprising 15 successive time slots, repeated every 20 ms, as illustrated in
The downlink transmission of the acknowledgement may be initiated only at the beginning of the AICH access slot offset by τp-a chips (τp-a being a number determined as a function of the length of the message that follows the preamble) relative to the beginning of the access slot used for the uplink transmission of the random access preamble. This offset is illustrated in
Before making a random access to the base station 1, a UE 2, 3 takes account of the system information broadcast by the network. By taking this information into account, it can determine and store the correspondence between AC access classes and ASC access service classes specific to each cell of the access network (see technical specification 3G TS 25.331 published by the 3GPP, version 3.9.0, sections 10.3.6.55 and 10.3.6.1). The mobile terminal in particular stores a correspondence between the AC access class 10 reserved for emergency calls and an ASC class. This correspondence can be updated in the memory of the terminal if modifications appear in the information broadcast by the network.
The UE then selects an ASC class according to the authorized access class that it is using for the call. During a standard call, the ASC class thus selected will be that which corresponds to the standard access classes (AC access classes from 0 to 9).
As previously indicated, one or more authorized subsets of pairs {(sc(i); Ps(n))/imin,k≦i≦imax,k and nmin,k≦n≦nmax,k} of the RACH set of resources will correspond to the class ASC(k) thus selected. The random access attempt by the UE will therefore use resources of that set.
On receipt of the access request, on the resources thus defined, the base station 1 finds the AC access class used for the service to be implemented, by dint of the correspondences established between, on the one hand, the random access resources and the ASC classes and, on the other hand, the ASC classes and the access classes and, provided that at least some of the correspondences between the elements are one-to-one.
During an emergency call, the emergency access class will be used and the class ASC(θ) will be selected by the UE 2, 3. The corresponding random access will not be able to be made without using the resources of the subset θ of pairs {(sc(i); Ps(n))/imin,θ≦i≦imax,θ and nmin,θ≦n≦nmax,θ}. The base station 1 will receive the random access request and will be capable of recognizing the use of the subset θ of resource pairs, hence the selection of the class ASC (θ) and consequently the use of the emergency calls access class.
In another embodiment, the assignment of the classes and the correspondence between the access resources on the one hand and the access classes and the access service classes on the other hand can be made such that the use of the access resources may allow the non-equivocal definition of types of communication services other than emergency calls, for example voice calls, data transmissions, etc.
Furthermore, when the base station 1 receives a random access request on a partition of the PRACH channel, it is capable of calculating, in conventional manner, the receive power of the received signal corresponding to the preamble transmitted by a UE. It then compares this transmit power with a threshold, predetermined where necessary, to determine whether the UE in question is or is not too close to the base station. Specifically, the access signal sent by the UE 3 close to the base station 1 will have a receive power close to the transmit power PI of that signal, as mentioned above, since signal attenuation will be low on the short path to be covered by the corresponding radio waves. On the other hand, a UE 2 further away from the base station 1 will see the transmit power PI of the signal carrying its RACH preamble greatly attenuated on receipt of the signal by the base station 1. Thus, an adequate adjustment of the power threshold can be used to dissociate with a greater or lesser degree of severity the mobile terminals considered to be too close to the base station.
When the UE attempting to access the network is considered to be too close to the base station (for example the UE 2, relative to the base station 1), the latter then inhibits the transmission of a positive acknowledgement of the preamble sent by the UE on the AICH channel. This inhibition may consist in the transmission of a negative acknowledgement on the appropriate AICH resources (as described above).
Such an inhibition has the effect of stopping the random access procedure at this stage. The access message constituting the second, and larger, portion of the random access request will then not be sent by the UE in question, thus avoiding generating an interference prejudicial to the communications in progress, particularly with the said base station. The interference is specifically limited to the noise generated by the transmission of a preamble, which may be considered weak in comparison with that which would be generated by the transmission of the access message which is larger in size than the preamble.
According to the invention and as illustrated in
If it is a conventional call, it is determined whether the UE having sent the random access preamble may be considered to be too close to the base station (step 60), for example based on the result of a comparison between the receive power of the signal carrying the preamble and a threshold, as indicated above. If it is in the affirmative, the transmission of a positive acknowledgement of the preamble will be inhibited (step 70) for example according to the embodiment described above, whereas this transmission will take place if the UE is not considered to be too close to the base station (step 50).
Such a choice is not open when the base station has detected that the access attempt concerned an emergency call, for example according to the embodiment described above. In this case specifically, there is no search to ascertain whether the UE is close to the base station in question, that is to say whether the associated access request is likely to generate interference, so that the emergency call can be established in all cases. Thus, a positive acknowledgement of the preamble will be transmitted to the UE attempting access, even though the latter is particularly close to the base station (step 50). A signal carrying the access request message following transmission of the preamble will then be transmitted by the UE to the base station and the access procedure will be carried out to completion, to allow the establishment of a communication link suitable to support the emergency call.
In a variant of the embodiment, the step 60 for estimating the proximity of the UE to the base station is carried out irrespective of the type of call to be implemented. On the other hand, the use of this estimate to inhibit where appropriate an acknowledgement of the access request will not be made unless the call is not an emergency call.
This may be achieved for example by fixing different thresholds depending on the partitions of the PRACH channel. Thus, a very high power threshold may be fixed for the partition corresponding to emergency calls, such that the receive power of the access request by the base station is always less than this threshold and therefore the UE is always considered to be far from the base station. On the other hand, a lower threshold may be used for the other partitions of the PRACH channel to allow distinctive processing of access procedures depending on whether they are made by UEs close to or far from the base station.
Fauconnier, Denis, Georgeaux, Eric
Patent | Priority | Assignee | Title |
8165103, | Jun 13 2006 | TELEFONAKTIEBOLAGET LM ERICSSON PUBL | Method and arrangement for preamble detection |
Patent | Priority | Assignee | Title |
5710982, | Jun 29 1995 | U S BANK NATIONAL ASSOCIATION | Power control for TDMA mobile satellite communication system |
5884165, | Oct 11 1994 | NTT Mobile Communications Network, Inc. | Mobile communication systems sharing a control channel |
6760311, | Nov 20 1998 | HIGHBRIDGE PRINCIPAL STRATEGIES, LLC, AS COLLATERAL AGENT | Thermal transmission control of wireless data modem |
7277407, | Oct 11 2000 | SAMSUNG ELECTRONICS CO , LTD | Apparatus and method for controlling transmit antenna array for physical downlink shared channel in a mobile communication system |
20030109274, | |||
20030210668, | |||
20040004944, | |||
20040109422, | |||
20040147242, | |||
20040184416, | |||
20040218567, | |||
EP1119118, | |||
GB2355887, | |||
WO143296, | |||
WO2098017, | |||
WO9965158, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Jun 24 2004 | Alcatel Lucent | (assignment on the face of the patent) | / | |||
Jul 26 2004 | GEORGEAUX, ERIC | Nortel Networks Limited | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 015160 | /0739 | |
Aug 02 2004 | FAUCONNIER, DENIS | Nortel Networks Limited | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 015160 | /0739 | |
Dec 31 2006 | Nortel Networks Limited | Alcatel Lucent | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 019706 | /0275 | |
Jan 30 2013 | Alcatel Lucent | CREDIT SUISSE AG | SECURITY AGREEMENT | 029821 | /0001 | |
Aug 19 2014 | CREDIT SUISSE AG | Alcatel Lucent | RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS | 033868 | /0001 | |
Jul 22 2017 | Alcatel Lucent | WSOU Investments, LLC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 044000 | /0053 | |
Aug 22 2017 | WSOU Investments, LLC | OMEGA CREDIT OPPORTUNITIES MASTER FUND, LP | SECURITY INTEREST SEE DOCUMENT FOR DETAILS | 043966 | /0574 | |
May 16 2019 | WSOU Investments, LLC | BP FUNDING TRUST, SERIES SPL-VI | SECURITY INTEREST SEE DOCUMENT FOR DETAILS | 049235 | /0068 | |
May 16 2019 | OCO OPPORTUNITIES MASTER FUND, L P F K A OMEGA CREDIT OPPORTUNITIES MASTER FUND LP | WSOU Investments, LLC | RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS | 049246 | /0405 | |
May 28 2021 | TERRIER SSC, LLC | WSOU Investments, LLC | RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS | 056526 | /0093 | |
May 28 2021 | WSOU Investments, LLC | OT WSOU TERRIER HOLDINGS, LLC | SECURITY INTEREST SEE DOCUMENT FOR DETAILS | 056990 | /0081 |
Date | Maintenance Fee Events |
Mar 08 2010 | ASPN: Payor Number Assigned. |
Mar 07 2013 | M1551: Payment of Maintenance Fee, 4th Year, Large Entity. |
Sep 11 2017 | REM: Maintenance Fee Reminder Mailed. |
Jan 26 2018 | M1552: Payment of Maintenance Fee, 8th Year, Large Entity. |
Jan 26 2018 | M1555: 7.5 yr surcharge - late pmt w/in 6 mo, Large Entity. |
Sep 13 2021 | REM: Maintenance Fee Reminder Mailed. |
Feb 28 2022 | EXP: Patent Expired for Failure to Pay Maintenance Fees. |
Date | Maintenance Schedule |
Jan 26 2013 | 4 years fee payment window open |
Jul 26 2013 | 6 months grace period start (w surcharge) |
Jan 26 2014 | patent expiry (for year 4) |
Jan 26 2016 | 2 years to revive unintentionally abandoned end. (for year 4) |
Jan 26 2017 | 8 years fee payment window open |
Jul 26 2017 | 6 months grace period start (w surcharge) |
Jan 26 2018 | patent expiry (for year 8) |
Jan 26 2020 | 2 years to revive unintentionally abandoned end. (for year 8) |
Jan 26 2021 | 12 years fee payment window open |
Jul 26 2021 | 6 months grace period start (w surcharge) |
Jan 26 2022 | patent expiry (for year 12) |
Jan 26 2024 | 2 years to revive unintentionally abandoned end. (for year 12) |